General

  • Target

    JaffaCakes118_6ef25a1542ede6602186c1159b6271d29a2b09aee97375a801840a4e274e344c

  • Size

    188KB

  • Sample

    241223-zssxsa1lfv

  • MD5

    9e3ce9bd3bbea0852ff332e14a29829e

  • SHA1

    025a6e85f8fad92241733cbe4c2bfb7c82db8967

  • SHA256

    6ef25a1542ede6602186c1159b6271d29a2b09aee97375a801840a4e274e344c

  • SHA512

    433ddf23e4ea9f6313b6843d976450f2fda7fca8ea2ff6f12e35bc92e8f5145b2b1b9d6c3228138649285f747e33a08a14004f8c55078105e9394f7b5f17ba00

  • SSDEEP

    3072:FteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzQ9qM:Bq7fYIHBZkTB6DWruUCOwjt

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

103.87.173.60:443

45.32.243.209:8116

207.180.208.54:4664

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_6ef25a1542ede6602186c1159b6271d29a2b09aee97375a801840a4e274e344c

    • Size

      188KB

    • MD5

      9e3ce9bd3bbea0852ff332e14a29829e

    • SHA1

      025a6e85f8fad92241733cbe4c2bfb7c82db8967

    • SHA256

      6ef25a1542ede6602186c1159b6271d29a2b09aee97375a801840a4e274e344c

    • SHA512

      433ddf23e4ea9f6313b6843d976450f2fda7fca8ea2ff6f12e35bc92e8f5145b2b1b9d6c3228138649285f747e33a08a14004f8c55078105e9394f7b5f17ba00

    • SSDEEP

      3072:FteMq7hp/YIzA6BZvlWnTDN2GL9L8NLXWruiuUCzTOwwc0cIzQ9qM:Bq7fYIHBZkTB6DWruUCOwjt

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks